Ethical Hacker

马上开始. 它是免费的哦
注册 使用您的电邮地址
Ethical Hacker 作者: Mind Map: Ethical Hacker

1. TERMINOLOGIES

1.1. 1. Threat 2. Exploit 3. Vulnerabilities ~target for the weak spot 4. Target of evaluation (TOE) 5. ATTACK!! 6. Remote

2. SYSTEM HACKING CYCLE

2.1. Recoinnsaince ~to locate enemy

2.2. scanning

2.3. gaining access

2.4. maintaining access

2.5. clearing tracks

3. HACKERS VS CRACKERS

3.1. hackers build things, crackers break things.

3.2. TYPES OF HACKERS

3.2.1. Script kiddies

3.2.2. White-hat hackers

3.2.3. Gray-hat hackers

3.2.4. Black-hat hackers

3.2.5. Suicide hackers

4. WAYS TO CONDUCT ETHICAL HACKING

4.1. Step 1. Formulating Your Plan

4.2. Step 2: Do Some Recon

4.3. Step 3: Launch the Attack

4.4. Step 4: Evaluate the Results

5. DEFINISI

5.1. Etichal hacker ni dia baik atau nama lain dia adalah white hat (ultimate security profesional)

6. JOB ROLE

6.1. 1. break into system legally 2. examine it. so it cannot be exploited

7. TESTING TYPES

7.1. White box

7.1.1. Full knowledge test :

7.2. Black box

7.2.1. Knowledge test

7.3. Gray box

7.3.1. Zero knowledge test